DPI blocking by Spanish ISPs (Fortinet/Telefonica) was circumvented by inserting a tab escape character (\t) into HTTP GET request headers, or by delaying HTTP GET transmission — the same techniques reported to have bypassed DPI blocking of Catalan referendum sites in 2017. Both techniques exploited the DPI's shallow, stateless inspection of the opening HTTP request.
From 2021-ververis-understanding — Understanding Internet Censorship in Europe: The Case of Spain
· §3.9
· 2021
· Web Science Conference
Implications
Shallow HTTP-header manipulation (whitespace insertion, transmission delays) remains an effective first-pass evasion against commodity Fortinet-class DPI; circumvention tools should apply these transforms before attempting more costly tunneling.
The continued effectiveness of 2017-era HTTP evasion through 2020 suggests blocking infrastructure is rarely upgraded once deployed — document vendor-specific quirks and test them longitudinally.